text stringlengths 0 1.99k |
|---|
doing a su xxx -c "xxx"). For matter, check all the crons. If you can |
take one system login, you should be able to get the rest, in time. |
-The disk files. |
These are rather odd. If you have read permission on the disks in /dev, |
then you can read any file on the system. All you have to do is find it in |
there somewhere. If the disk is writeable, if you use /etc/fsbd, you can |
modify any file on the system into whatever you want, such as by changing |
the permissions on /bin/sh to 4555. Since this is pretty difficult to |
understand (and I don't get it fully), then I won't bother with it any |
more. |
-Trivial su. |
You know with su you can log into anyone else's account if you know their |
passwords or if you're root. There are still a number of system 5's that |
have uid 0, null passwd, rsh accounts on them. Just be sure to remove your |
entry in /usr/adm/sulog. |
-Trojan horses? On Unix? |
Yes, but because of the shell variable PATH, we are generally out of luck, |
because it usually searches /bin and /usr/bin first. However, if the first |
field is a colon, files in the present directory are searched first. Which |
means if you put a modified version of 'ls' there, hey. If this isn't the |
case, you will have to try something more blatant, like putting it in a |
game (see Shooting Shark's file a while back). If you have a system login, |
you may be able to get something done like that. See cron. |
Taking over: |
Once you have root privs, you should read all the mail in /usr/mail, just |
to sure nothing interesting is up, or anyone is passing another systems |
passwds about. You may want to add another entry to the passwd file, but |
that's relatively dangerous to the life of your machine. Be sure not to |
have anything out of the ordinary as the entry (i.e., No uid 0). |
Get a copy of the login program (available at your nearest decent BBS, I |
hope) of that same version of Unix, and modify it a bit: on system 5, |
here's a modification pretty common: in the routine to check correct |
passwds, on the line before the actual pw check, put a if |
(!(strcmp(pswd,"woof"))) return(1); to check for your 'backdoor', enabling |
you to log on as any valid user that isn't uid 0 (On system 5). |
Neato things: |
-Have you ever been on a system that you couldn't get root or read the |
Systems/L.sys file? Well, this is a cheap way to overcome it: 'uuname' |
will list all machines reachable by your Unix, then (Assuming they aren't |
Direct, and the modem is available): |
$ cu -d host.you.want [or] |
$ uucico -x99 -r1 -shost.you.want |
Both will do about the same for us. This will fill your screen with lots |
of trivial material, but will eventually get to the point of printing the |
phone number to the other system. -d enables the cu diagnostics, -x99 |
enables the uucico highest debug, and -R1 says 'uucp master'. |
Back a year or two, almost everywhere had their uucp passwd set to the same |
thing as their nuucp passwd (Thanks to the Systems file), so it was a |
breeze getting in. Even nowadays, some places do it.. You never can tell. |
-Uucp: |
I personally don't like the uucp things. Uucico and uux are limited by the |
Permissions file, and in most cases, that means you can't do anything |
except get & take from the uucppublic dirs. Then again, if the |
permission/L.cmd is blank, you should be able to take what files that you |
want. I still don't like it. |
-Sending mail: |
Sometimes, the mail program checks only the shell var LOGNAME, so change |
it, export it, and you may be able to send mail as anyone. (Mainly early |
system 5's.) |
$ LOGNAME="root";export LOGNAME |
-Printing out all the files on the system: |
Useful if you're interested in the filenames. |
$ find / -print >file_list& |
And then do a 'grep text file_list' to find any files with 'text' in their |
names. Like grep [.]c file_list, grep host file_list.... |
-Printing out all restricted files: |
Useful when you have root. As a normal user, do: |
$ find / -print >/dev/null& |
This prints out all nonaccessable directories, so become root and see what |
they are hiding. |
-Printing out all the files in a directory: |
Better looking than ls -R: |
$ find . -print |
It starts at the present dir, and goes all the way down. Catches all |
'.files', too. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.